(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Data Based Privacy


If the database were hacked or stolen the credit card information would be unreadable without the private key. Only the bank which does the billing for the company needs the private key used to decrypt the credit card information.
             There are many benefits to this system, first of all it is virtually impenetrable to hackers as they would need to hack both the database and the bank to acquire the database and the key. An additional feature of this system is that if the credit card number is known, the records associated with it can be easily retrieved. The credit card number can be encrypted using the public key and the encrypted number can then be used to search the database for a match. Since key based encryption does not use salts or random bits, encrypting an identical number will yield the same result. This system is used by eBay and Half.com to ensure the security of the credit card information.
             Regardless of whether the vital data is encrypted or not, strict access management rules need to be enforced. Access management ensures that only the people who need the information can access it or modify it. Each user must have an individual account, it is poor practice to create accounts such as "qauser", "accountinguser" and the like which are used by entire departments. With such accounts user tracking is futile, it is much easier to tell which employee is trying to modify data they have no business looking at when the username is "john.smith". Finally, it is also very important that those employees that require administrator level access only use that level of access when they need it and a more restrictive profile at all other times in order to prevent accidental loss of data.
             Information Usage:.
             Once properly implemented, an information management system can easily and quickly produce mailing lists of all current and previous customers of the company. The data can even be used to produce a list of potential customers or sold to a third-party company to use as they wish.


Essays Related to Data Based Privacy


Got a writing question? Ask our professional writer!
Submit My Question